Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Information Technology
1009-2552
2003 Issue 9
The circuit design of automatic frequency measurer
wang ge si ; lu ying nan
..............
page:30-31
Combining design of CAI courseware with technology of database
zhang xue mei ; qin min ; zhang yi hui ; shi xin ying
..............
page:32-33,36
Packet binary convolutional coding modulation in WLAN
liu yong jun ; cheng guo bing ; gou yan xin
..............
page:34-36
The policy to prevent the campus net's IP address from embezzlement
li guo jin ; li xin chun
..............
page:37-39
Analysis and design of E-business simulation software system
wan jun ; li ling ; he wen yi
..............
page:40-42
The study and practice of postal CRM
wang zuo peng ; liu yu lian ; li zhe feng
..............
page:43-44,46
Security analysis of feed-forward stream cipher
zhao ruo zuo ; ma guo zhong
..............
page:45-46
The realization of web server's security using SSL security protocol
zhang bin ren
..............
page:47-48,52
di yi ge dian xin shi chang jian guan fa gui chu tai deng liu ze
..............
page:目次4
The study of statistic method in information industry
bo yi min ; gao fu dong
..............
page:81-84
The working mode of digital libraries in university readers' information services
jiang sheng hua
..............
page:78-80
IC card electrical quantities detection equipment and its data processing software
wu feng jiang ; liu kai
..............
page:76-77
The application of database synchronizing technology
wu gang ; wang hui ; wu qiang
..............
page:73-75,80
The practical technology and method in developring DirectX program
lu bin ; xu ke wen ; he zhi qiang
..............
page:70-72
An algorithm of protecting software copyright
liu ke cheng ; zhang ling xiao
..............
page:67-69
Network programming based on Winsock
yang lei ; chen zuo ; yue xin
..............
page:65-66
Analysis of intrusion detection system based on network data security
li zhen hui ; tang bei ping ; liu
..............
page:62-64
Discussion on construction of computer room
zhang ying li
..............
page:60-61
Technical characteristics and connection methods of ups
li guo chen
..............
page:58-59
Study of selective acknowledgement algorithm
liu yong min ; nian xiao hong
..............
page:55-57,72
Analysis of the technical point of making management form using VFP
liu han jie
..............
page:53-54
Study on the efficiency of SOAP protocol
xu zhi ping
..............
page:49-52
Anti-jumming technology of the Bluetooth and analysis for the mechanism of coexistance is the wireless network in 2.4GHz frequency band
yang guang song ; shi jiang hong ; sun jian min
..............
page:8-10,12
ASIC chip based on bluetooth and its back-end realization
tang zhen yu ; chen yong en
..............
page:5-7,18
Integrated recognition systems of handwriting digits based on multiple neural networks
chen fang xin ; ma xiang ; jiang xin ; wang bing wen
..............
page:1-4
The application of DSP in intelligent domestic automation system
sun xiu shan
..............
page:28-29,59
The design of mobile communication NMS based on CORBA
li hong lei ; ma li min ; zhang qiang
..............
page:25-27
Multimedia content description interface--MPEG-7
wang ru yan ; ding jie ; yu zuo
..............
page:22-24,27
The application of X25645 on DSP
zhao zhi jie ; yang long ; zhang zhi gang
..............
page:19-21
Application of fault diagnosis of generator based on chaotic neural network
qu zheng wei ; tian guang jun
..............
page:16-18
Design and implementation of secure E-mail system based on Web
zhang zuo ; wang hong ; gong lan fang
..............
page:13-15
The application of bispectrum estimation for seeker signal detection and processing
li yi bing ; ren da meng ; qu hui ying
..............
page:11-12